Π£ Π½Π°Ρ Π²Ρ ΠΌΠΎΠΆΠ΅ΡΠ΅ ΠΏΠΎΡΠΌΠΎΡΡΠ΅ΡΡ Π±Π΅ΡΠΏΠ»Π°ΡΠ½ΠΎ Real Time Interception And Monitoring Of A DECT Cordless Telephone ΠΈΠ»ΠΈ ΡΠΊΠ°ΡΠ°ΡΡ Π² ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΠΌ Π΄ΠΎΡΡΡΠΏΠ½ΠΎΠΌ ΠΊΠ°ΡΠ΅ΡΡΠ²Π΅, Π²ΠΈΠ΄Π΅ΠΎ ΠΊΠΎΡΠΎΡΠΎΠ΅ Π±ΡΠ»ΠΎ Π·Π°Π³ΡΡΠΆΠ΅Π½ΠΎ Π½Π° ΡΡΡΠ±. ΠΠ»Ρ Π·Π°Π³ΡΡΠ·ΠΊΠΈ Π²ΡΠ±Π΅ΡΠΈΡΠ΅ Π²Π°ΡΠΈΠ°Π½Ρ ΠΈΠ· ΡΠΎΡΠΌΡ Π½ΠΈΠΆΠ΅:
ΠΡΠ»ΠΈ ΠΊΠ½ΠΎΠΏΠΊΠΈ ΡΠΊΠ°ΡΠΈΠ²Π°Π½ΠΈΡ Π½Π΅
Π·Π°Π³ΡΡΠ·ΠΈΠ»ΠΈΡΡ
ΠΠΠΠΠΠ’Π ΠΠΠΠ‘Π¬ ΠΈΠ»ΠΈ ΠΎΠ±Π½ΠΎΠ²ΠΈΡΠ΅ ΡΡΡΠ°Π½ΠΈΡΡ
ΠΡΠ»ΠΈ Π²ΠΎΠ·Π½ΠΈΠΊΠ°ΡΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌΡ ΡΠΎ ΡΠΊΠ°ΡΠΈΠ²Π°Π½ΠΈΠ΅ΠΌ Π²ΠΈΠ΄Π΅ΠΎ, ΠΏΠΎΠΆΠ°Π»ΡΠΉΡΡΠ° Π½Π°ΠΏΠΈΡΠΈΡΠ΅ Π² ΠΏΠΎΠ΄Π΄Π΅ΡΠΆΠΊΡ ΠΏΠΎ Π°Π΄ΡΠ΅ΡΡ Π²Π½ΠΈΠ·Ρ
ΡΡΡΠ°Π½ΠΈΡΡ.
Π‘ΠΏΠ°ΡΠΈΠ±ΠΎ Π·Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ΅ΡΠ²ΠΈΡΠ° ClipSaver.ru
G'day. Welcome to the VK8FOES YouTube channel. A few weeks ago, I showcased in a video how it was possible to intercept and monitor voice traffic on a DECT wireless b@by monitoring system due to the manufacturer not implementing encryption and security. In this video, I will be demonstrating how it is possible to do the same on an DECT cordless telephone. What you are seeing here is a VTech branded cordless telephone with the model number of CS6114. This is a North American market DECT 6.0 telephone that was manufactured in the year of 2017 according to the packaging box. The significance of this particular cordless telephone model is the fact that VTech neglected to implement encryption! DECT 6.0 is a slightly different frequency band to Europe/Asia/Australia and is therefore not legal to use in my location, so I will keep this video rather short. Using my smartphone, I proceed to dial the landline telephone number at my premises and answer the call. Gr-dect2 is a GNU-radio flowchart which can decode DECT voice traffic from cordless phones. I then find the carrier frequency the telephone is operating on which generally sits between channels 21 and 25) Australian DECT phones usually hover around channels one to eight. The next thing I do is find the 'part' A bit of explanation is needed for this, RFP stands for βradio fixed partβ and is the base station. Simply put, the cradle the handset sits in that is connected to the telephone line. PP stands for βportable partβ and is the handset. Gr-dect2 will display the letter 'v' next to each 'part' signifying that voice traffic is present. Selecting the base station part (RFP) will allow the audio from the party on the other end of the telephone call to be heard, and selecting the handset part (PP) will allow the audio being spoken into the cordless telephone to be heard. And here is where the fun begins, because the VTech CS6114 cordless phone does not implement security and encryption, once I select the RFP radio fixed part and speak into my smartphone, the DECT voice traffic is decoded and played back through my PC speakers. Remember, this phone was manufactured and sold back in 2017, not that long ago in the current year of 2022. There must be thousands of these unsecured cordless phone out there being used by unsuspecting people every day. This demonstration shows how much of a valuable tool a software defined radio and gr-dect2 can be for OPSEC. Now for the disclaimers: This video was made for educational purposes only, and to show cordless phone users the potential privacy risk of unsecured DECT and how to test if their voice communications are secure. Attempting to intercept and monitor private communications is illegal and punishable by hefty fines and imprisonment. You have been warned! HARDWARE VTech CS6114 Cordless Telephone HackRF One Software Defined Radio SOFTWARE DragonOS Linux by @cemaxecuter7783 gr-dect2 volk_profile